Author of the publication

Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model.

, and . Public Key Cryptography (1), volume 14601 of Lecture Notes in Computer Science, page 259-288. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvements on Security Evaluation of AES against Differential Bias Attack., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (11): 2398-2407 (2017)Algebraic Degree Estimation for Integral Attack by Randomized Algorithm., and . WISA, volume 10144 of Lecture Notes in Computer Science, page 292-304. (2016)Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model., and . IACR Cryptol. ePrint Arch., (2022)Simple and Memory-Efficient Signature Generation of $XMSS^MT$., and . SAC, volume 13203 of Lecture Notes in Computer Science, page 377-397. Springer, (2021)Experimental Verification of Estimated Block Size of BKZ Algorithm Against LWE., , and . ICISS, volume 13146 of Lecture Notes in Computer Science, page 173-184. Springer, (2021)Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model., and . Public Key Cryptography (1), volume 14601 of Lecture Notes in Computer Science, page 259-288. Springer, (2024)Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher., , , and . ICISS, volume 9478 of Lecture Notes in Computer Science, page 303-323. Springer, (2015)Theoretical Security Evaluation Against Side-Channel Cube Attack with Key Enumeration., and . LATINCRYPT, volume 11368 of Lecture Notes in Computer Science, page 145-165. Springer, (2017)Algebraic Degree Estimation of Block Ciphers Using Randomized Algorithm; Upper-Bound Integral Distinguisher. International Journal on Cryptography and Information Security (IJCIS), 6 (3/4): 1-21 (December 2016)Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration., and . AFRICACRYPT, volume 10239 of Lecture Notes in Computer Science, page 95-113. (2017)